Skip to main content
Redhat Developers  Logo
  • Products

    Platforms

    • Red Hat Enterprise Linux
      Red Hat Enterprise Linux Icon
    • Red Hat AI
      Red Hat AI
    • Red Hat OpenShift
      Openshift icon
    • Red Hat Ansible Automation Platform
      Ansible icon
    • See all Red Hat products

    Featured

    • Red Hat build of OpenJDK
    • Red Hat Developer Hub
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenShift Dev Spaces
    • Red Hat OpenShift Local
    • Red Hat Developer Sandbox

      Try Red Hat products and technologies without setup or configuration fees for 30 days with this shared Red Hat OpenShift and Kubernetes cluster.
    • Try at no cost
  • Technologies

    Featured

    • AI/ML
      AI/ML Icon
    • Linux
      Linux Icon
    • Kubernetes
      Cloud icon
    • Automation
      Automation Icon showing arrows moving in a circle around a gear
    • See all technologies
    • Programming languages & frameworks

      • Java
      • Python
      • JavaScript
    • System design & architecture

      • Red Hat architecture and design patterns
      • Microservices
      • Event-Driven Architecture
      • Databases
    • Developer experience

      • Productivity
      • Tools
      • GitOps
    • Automated data processing

      • AI/ML
      • Data science
      • Apache Kafka on Kubernetes
    • Platform engineering

      • DevOps
      • DevSecOps
      • Red Hat Ansible Automation Platform for applications and services
    • Secure development & architectures

      • Security
      • Secure coding
  • Learn

    Featured

    • Kubernetes & cloud native
      Openshift icon
    • Linux
      Rhel icon
    • Automation
      Ansible cloud icon
    • AI/ML
      AI/ML Icon
    • See all learning resources

    E-books

    • GitOps cookbook
    • Podman in action
    • Kubernetes operators
    • The path to GitOps
    • See all e-books

    Cheat sheets

    • Linux commands
    • Bash commands
    • Git
    • systemd commands
    • See all cheat sheets

    Documentation

    • Product documentation
    • API catalog
    • Legacy documentation
  • Developer Sandbox

    Developer Sandbox

    • Access Red Hat’s products and technologies without setup or configuration, and start developing quicker than ever before with our new, no-cost sandbox environments.
    • Explore the Developer Sandbox

    Featured Developer Sandbox activities

    • Get started with your Developer Sandbox
    • OpenShift virtualization and application modernization using the Developer Sandbox
    • Explore all Developer Sandbox activities

    Ready to start developing apps?

    • Try at no cost
  • Blog
  • Events
  • Videos

Secure Boot certificate changes in 2026: Guidance for RHEL environments

February 4, 2026
Pradeep Jagtap
Related topics:
LinuxSecurity
Related products:
Red Hat Enterprise Linux

    Microsoft's 2011 Secure Boot signing certificate is scheduled to expire on June 26, 2026. This has raised questions across enterprise Linux environments about system bootability, shim updates, and required actions. First and foremost, the key message is simple: Existing Red Hat Enterprise Linux (RHEL) systems that boot successfully today will continue to boot after June 26, 2026. The certificate expiration affects the ability to sign new boot components, not the ability to boot with already trusted ones.

    Microsoft has started signing Secure Boot components using the 2023 UEFI CA certificate. Following this change, Red Hat is releasing updated shims signed with the 2023 key for supported Red Hat Enterprise Linux releases, beginning with RHEL 9.7, after completing full validation and testing.

    You probably have lots of questions, though. This article provides comprehensive answers and resources to help.

    What is UEFI Secure Boot and how does it work?

    Secure Boot is a UEFI firmware security feature developed by the UEFI Consortium to ensure that only immutable and signed software are loaded during boot time. Secure Boot leverages digital signatures to validate the authenticity, source, and integrity of the code that's loaded. These validation steps are taken to prevent malicious code from being loaded and to prevent attacks, such as the installation of certain types of rootkits.

    Microsoft acts as a certificate authority, and signs the first stage bootloader (called the "shim") with their private key, and the associated public certificate is enrolled in firmware by hardware vendors. Signing with the 2011 key will no longer be possible after June 2026, so the public certificate needs to be updated in order for shim updates, signed with the new key, to boot.

    For more information, read What is UEFI Secure Boot and how does it work?

    What does the 2026 certificate expiration mean for RHEL?

    Systems with the 2011 Microsoft UEFI CA certificate already enrolled will continue to boot after June 26, 2026.

    The expiration only affects some customers who perform custom signing, such as signing custom kernels, bootloaders, or modules enabled with Secure Boot. It does not impact booting from already signed or existing components.

    Red Hat plans to release new shims for supported releases, starting from RHEL 9.7, after signing with the new certificate has started and has been thoroughly tested.

    Long-lived systems that cannot receive an update to their Secure Boot database (DB) may face issues when a bootloader or shim update is required after the expiration.

    Systems running stable configurations with Secure Boot disabled are not impacted.

    What are the recommended actions for Red Hat environments?

    If you manage RHEL deployments, here's what you should do:

    1. First, assess the Secure Boot settings on your systems
    • Review Secure Boot configuration on each system
    • Confirm the enrolled keys are valid, and verify the installed shim version
    • Ensure configurations align with your organization's security policies
    1. Do not manually apply the 2023 UEFI DB update until your hardware vendor provides explicit instructions
    2. Stay informed on security advisories
    • Regularly monitor Red Hat errata and security advisories for updates related to shim, Secure Boot, and UEFI
    • Plan updates and mitigations based on the advisories to avoid unplanned downtime

    How can I determine whether Secure Boot is enabled on my systems?

    You can verify the status of Secure Boot using the mokutil command:

    $ sudo mokutil --sb-state

    The output states whether Secure Boot is enabled or disabled. For example, on a system with Secure Boot enabled:

    $ sudo mokutil --sb-state
    SecureBoot enabled

    For more information, read the How to check if Secure Boot is enabled on your systems? article.

    How can I determine which Secure Boot certificates are enrolled?

    You can use mokutil to list enrolled keys:

    $ sudo mokutil --db
    62b51ed2e6 ASUSTeK Notebook SW Key Certificate
    46def63b5c Microsoft Corporation UEFI CA 2011
    580a6f4cc4 Microsoft Windows Production PCA 2011
    b5eeb4a670 Microsoft UEFI CA 2023
    45a0fa3260 Windows UEFI CA 2023

    How do I update my firmware using LVFS?

    Enable and use Linux vendor firmware service (LVFS) to ensure that the latest vendor-provided firmware is installed:

    $ sudo fwupdmgr update

    Firmware is provided by hardware vendors, not by Red Hat. For more information, read How do I update my firmware using LVFS?.

    Can I update the UEFI Secure Boot DB directly and without a full firmware update?

    Not always. Standalone DB updates are blocked on some platforms, including HP and Fujitsu, due to previous system failures. These vendors require Secure Boot DB updates to be delivered with approved firmware updates.

    Do not force install DB updates. Always follow vendor guidance.

    Should I install the 2023 UEFI db update now?

    Delay manual installation until the hardware vendor provides guidance, especially if on HP or Fujitsu systems.

    How does this apply to virtual machines using OVMF?

    Virtual environments rely on the edk2-ovmf package to provide both the UEFI firmware and the NVRAM template when a new VM is created. This means the certificate set inside edk2-ovmf becomes the baseline for Secure Boot in any new virtual machine (VM) deployment.

    To ensure that a new VM starts with the updated Microsoft 2023 Secure Boot certificates, update the edk2-ovmf package on the hypervisor or host system.

    If edk2-ovmf is outdated, then newly created VMs would inherit older certificate bundles. These VMs may later hit Secure Boot validation issues when newer shims are released.

    The packages that include the new certificates are:

    • RHEL 10: edk2-ovmf-20241117-2.el10.noarch and later
    • RHEL 9: edk2-ovmf-20231122-6.el9.noarch and later
    • RHEL 8: Not applicable

    The newer edk2-ovmf builds include both the 2011 and 2023 Microsoft Secure Boot certificates. This ensures compatibility with shims signed by either key, so you can safely update to these versions immediately.

    After the update, any new VM created with OVMF firmware will start with the correct certificate set.

    Summary

    Secure Boot certificate expiration in 2026 does not break existing systems. Red Hat provides shims signed with the 2023 certificate for supported RHEL releases. Secure Boot DB and firmware updates remain controlled by the vendor. For virtual environments, you must ensure that edk2-ovmf is current for new VM deployments.

    The best way to manage your UEFI updates is through awareness, vendor alignment, and avoiding unnecessary manual intervention. This article has provided you with a head start.

    Related Posts

    • Use fwupd to deploy Linux firmware updates and more

    Recent Posts

    • Secure Boot certificate changes in 2026: Guidance for RHEL environments

    • Upgrade volume performance without downtime: VolumeAttributesClass on OpenShift

    • What’s new for developers in OpenShift 4.21

    • Kafka Monthly Digest: January 2026

    • How Developer Hub simplifies Backstage configuration

    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Platforms

    • Red Hat AI
    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Build

    • Developer Sandbox
    • Developer tools
    • Interactive tutorials
    • API catalog

    Quicklinks

    • Learning resources
    • E-books
    • Cheat sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site status dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2025 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility

    Report a website issue